1.
Which of the following is not one of the three main categories of cryptography?
Correct Answer
A. SteganograpHy
Explanation
The three main categories of cryptography are physical, mathematical, and quantum. Steganography is a form of physical cryptography but not a category of its own.
2.
Which type of cipher is a simple coding system that changes one character or symbol into another?
Correct Answer
D. Substitution
Explanation
A substitution cipher is a simple coding system that changes one character or symbol into another. There is no such valid cipher as reverseography. Steganography is the hiding of one message within another. A transposition cipher is one in which characters are scrambled in a certain manner.
3.
Which of the following is a hexadecimal value that is computed to verify authenticity?
Correct Answer
B. Checksum
Explanation
A checksum is a hexadecimal value that is computed to verify authenticity. The other values are not hexadecimal values computed to verify authenticity.
4.
If security is a real concern on your network, what length do most experts recommend as the minimum for password length?
Correct Answer
A. 10
Explanation
If security is a real concern on your network, most experts recommend 10 characters as the minimum for password length. They also recommend including as many different character sets as possible.
5.
Which of the following involves looking at blocks of an encrypted message to determine whether any common patterns exist?
Correct Answer
C. Frequency analysis
Explanation
Frequency analysis involves looking at blocks of an encrypted message to determine whether any common patterns exist. Quantum cryptography is a form of encryption that is based on the characteristics of the smallest particles known. Algorithm errors occur when predictable results create a weakness in the coding system. Brute-force attacks apply every possible combination of characters until a match is found.
6.
Which of the following is the process of converting a message into a numeric value?
Correct Answer
A. Hashing
Explanation
Hashing is the process of converting a message into a numeric value.
7.
Which of the following is not one of the three most common versions of Message Digest Algorithm (MDA)?
Correct Answer
B. MD3
Explanation
The three most common versions of MDA are MD2, MD4, and MD5.
8.
Which of the following is an update to Secure Hash Algorithm (SHA)?
Correct Answer
A. SHA-1
Explanation
The update for SHA is the SHA-1 standard.
9.
What bit hash value does Secure Hash Algorithm (SHA) produce?
Correct Answer
C. 160
Explanation
Secure Hash Algorithm (SHA) produces a 160-bit hash value.
10.
What bit hash value does MD5 produce?
Correct Answer
B. 128
Explanation
MD5 produces a 128-bit hash value.
11.
Symmetric algorithm encryption methods use either of which two ciphers? (Choose two.)
Correct Answer(s)
A. Block
B. Stream
Explanation
Symmetric algorithm encryption methods use either a block cipher or a stream cipher.
12.
Which type of cipher involves the hiding of one message within another?
Correct Answer
B. SteganograpHy
Explanation
Steganography is the hiding of one message within another. There is no such valid cipher as reverseography. A transposition cipher is one in which characters are scrambled in a certain manner. A substitution cipher is a simple coding system that changes one character or symbol into another.
13.
Which of the following was developed by a Swiss consortium and uses a 128-bit algorithm key for symmetric encryption?
Correct Answer
A. IDEA
Explanation
IDEA was developed by a Swiss consortium and uses a 128-bit algorithm key for symmetric encryption. CAST was developed by Carlisle Adams and Stafford Tavares and uses a 40-bit to 128-bit key. Blowfish is a 64-bit block cipher. RC5 uses a key size up to 2,048 bits.
14.
Which of the following is an asymmetric algorithm based on calculating logarithms?
Correct Answer
D. Both B & C
Explanation
Both Diffie-Hellman and El Gamal are asymmetric algorithms based on calculating logarithms. Here's a brief explanation of each:
Diffie-Hellman: This algorithm is a method for securely exchanging cryptographic keys over a public channel, allowing two parties to establish a shared secret key. It is based on the difficulty of calculating discrete logarithms.
El Gamal: This algorithm is used for public key encryption and digital signatures. It is based on the difficulty of solving the discrete logarithm problem and is an extension of the Diffie-Hellman key exchange.
RSA, while also an asymmetric algorithm, relies on the difficulty of factoring large prime numbers, not logarithms. ECC (Elliptic Curve Cryptography) is another asymmetric algorithm that is based on the algebraic structure of elliptic curves over finite fields.
15.
Which of the following is derived from the message and a key and is used to verify the integrity of a message?
Correct Answer
A. MAC
Explanation
Message Authentication Code (MAC) is derived from the message and a key and is used to verify integrity of a message. The other choices listed are not valid options.
16.
Which of the following is not a key component of PKI?
Correct Answer
B. LRB
Explanation
The four key components of Public Key Infrastructure (PKI) are certificate authority (CA), registration authority (RA), RSA, and digital certificates.
17.
Which is named after the creators and uses a 40-bit to 128-bit key for symmetric encryption?
Correct Answer
B. CAST
Explanation
CAST was developed by Carlisle Adams and Stafford Tavares and uses a 40-bit to 128-bit key. IDEA was developed by a Swiss consortium and uses a 128-bit algorithm key. Blowfish is a 64-bit block cipher. RC5 uses a key size up to 2,048 bits for symmetric encryption.
18.
Which of the following is a form of encryption based on the characteristics of the smallest particles known?
Correct Answer
A. Quantum cryptograpHy
Explanation
Quantum cryptography is a form of encryption that is based on the characteristics of the smallest particles known. Algorithm errors occur when predictable results create a weakness in the coding system. Frequency analysis involves looking at blocks of an encrypted message to determine whether any common patterns exist. Brute-force attacks apply every possible combination of characters until a match is found.
19.
What is the primary difference between an RA and LRA?
Correct Answer
C. The LRA can be used to identify or establish the identity of an individual.
Explanation
The Local Registration Authority (LRA) can be used to identify or establish the identity of an individual.
20.
What is the most popular version of X.509?
Correct Answer
B. Version 3
Explanation
The most popular version of X.509 is version 3.
21.
Which of the following is a statement that the CA uses to issue certificates and implement the policies of the CA?
Correct Answer
C. CPS
Explanation
The Certificate Practice Statement (CPS) is a statement that the CA uses to issue certificates and implement the policies of the CA. The Certificate Revocation List (CRL) is a list of the certificates that are being revoked (usually because they were lost or stolen). The other choices are not valid for PKI.
22.
Which of the following is not one of the main types of trust models used with PKI?
Correct Answer
D. Star
Explanation
The four main types of trust models used with PKI are hierarchical, bridge, mesh, and hybrid.
23.
Which of the following is based on the idea of using large integer numbers for the basis of asymmetric encryption?
Correct Answer
D. RSA
Explanation
RSA uses large integer numbers for the basis of its process. ECC is based on the idea of using points on a curve to define the public/private key pair. Diffie-Hellman is used for the transmission of keys only. El Gamal is an asymmetric algorithm based on calculating logarithms.
24.
Which of the following is a 64-bit block cipher?
Correct Answer
C. Blowfish
Explanation
Blowfish is a 64-bit block cipher. IDEA was developed by a Swiss consortium and uses a 128-bit algorithm key. CAST was developed by Carlisle Adams and Stafford Tavares and uses a 40-bit to 128-bit key. RC5 uses a key size up to 2,048 bits for symmetric encryption.
25.
In which PKI trust model does a root CA at the top provide all the information to intermediate CAs?
Correct Answer
A. Hierarchical
Explanation
In the hierarchical model, a root CA at the top provides all the information to intermediate CAs (and they pass it down to leaf CAs). This does not happen in the other models.
26.
Which of the following occur when predictable results create a weakness in the coding system?
Correct Answer
B. Algorithm errors
Explanation
Algorithm errors occur when predictable results create a weakness in the coding system. Quantum cryptography is a form of encryption that is based on the characteristics of the smallest particles known. Frequency analysis involves looking at blocks of an encrypted message to determine whether any common patterns exist. Brute-force attacks apply every possible combination of characters until a match is found.
27.
Which government agency was formerly known as the National Bureau of Standards?
Correct Answer
B. NIST
Explanation
The National Institute of Standards and Technology (NIST) was formerly known as the National Bureau of Standards (NBS).
28.
Which is the simplest type of PKI trust model in which a peer-to-peer relationship exists between the root CAs?
Correct Answer
B. Bridge
Explanation
In a bridge trust model, a peer-to-peer relationship exists between the root CAs. This can also be true in the mesh and hybrid models, but they are not the simplest model in which this happens. In the hierarchical model, a root CA at the top provides all the information to intermediate CAs (and they pass it down to leaf CAs).
29.
Which of the following is a list of which certificates are being revoked?
Correct Answer
B. CRL
Explanation
The Certificate Revocation List (CRL) is a list of the certificates that are being revoked (usually because they are lost or stolen). The Certificate Practice Statement (CPS) is a statement that that CA uses to issue certificates and implement the policies of the CA. The other choices are not valid for PKI.
30.
Which of the following is based on the idea of using points on a curve to define the public/private key pair?
Correct Answer
A. ECC
Explanation
ECC is based on the idea of using points on a curve to define the public/private key pair. Diffie-Hellman is used for the transmission of keys only. El Gamal is an asymmetric algorithm based on calculating logarithms. RSA uses large integer numbers for the basis of its process.